Professional Documents
Culture Documents
1. Computer Threats
i. How to fix them
2. Denial-of-Service
i. How to fix them
3. Man-In the Middle Attack
i. How to fix them
4. Cyberstalking
i. How to fix them?
5. Identity Theft
6. Mobile Security
i. How to fix them
7. Social Networking
i. What is Social Networking:
ii. Issues :
iii. Tips for Social Networking Sites
8. Cyber Harassment
i. How to fix them
Computer Threats
Malware: is a portmanteau from the words Malicious and Software, is software designed to infiltrate or damage a computer system without the owner's informed
consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.
The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
A VIRUS can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a
user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of
spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
A Computer Worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so
without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network,
if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
The Trojan horse, also known as trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a
desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine, giving them the ability to save their files
on the user's computer or even watch the user's screen and control the computer.
Spyware is computer software that is installed surreptitiously on a personal computer to collect information about a user, their computer or browsing habits without
the user's informed consent.
Backdoor : is a method of bypassing normal authentication procedures. Once a system has been compromised (by one of the above methods, or in some other
way), There is possibility of one or more backdoors may be installed, in order. Backdoors may also be installed prior to malicious software, to allow attackers entry.
Denial-of-Service
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended
users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or persons to
prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.
Some of the attacks will control your antivirus, firewall programs so that you may not scan and find the viruses and other malware. The attackers trying to deny to
use your own services in your computer.
https://vikaspedia.in/education/digital-litercy/information-security/computer-threats-and-attacks 1/4
4/26/22, 12:41 PM Computer Threats and Attacks — Vikaspedia
If needed, Scan with latest updated Antivirus and products before installing such applications
Cyberstalking
What is Cyberstaking
Cyberstalking is the use of the Internet or other electronic means to stalk someone. It has been defined as the use of information and communications technology,
particularly the Internet, by an individual or group of individuals, to harass another individual, group of individuals, or organization.
The behavior includes false accusations, monitoring, the transmission of threats, identity theft, damage to data or equipment, the solicitation of minors for sexual
purposes, and gathering information for harassment purposes. The harassment must be such that a reasonable person, in possession of the same information,
would regard it as sufficient another reasonable distress.
Cyberstalking is a relatively new phenomenon. With the decreasing expense and thereby increased availability of computers and online services, more individuals
are purchasing computers and "logging onto" the Internet, making another form of communication vulnerable to abuse by stalkers.
Cyberstalkers target their victims through chat rooms, message boards, discussion forums, and e-mail. Cyberstalking takes many forms such as: threatening or
obscene e-mail; spamming (in which a stalker sends a victim a multitude of junk e-mail); live chat harassment or flaming (online verbal abuse); leaving improper
messages on message boards or in guest books; sending electronic viruses; sending unsolicited e-mail; tracing another person's computer and Internet activity,
and electronic identity theft.
Similar to stalking off-line, online stalking can be a terrifying experience for victims, placing them at risk of psychological trauma, and possible physical harm. Many
cyberstalking situations do evolve into off-line stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail,
trespassing, and physical assault.
Identity Theft
Identity theft is a crime used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits. The term is
relatively new and is actually a misnomer, since it is not inherently possible to steal an identity, only to use it. The person whose identity is used can suffer various
consequences when he or she is held responsible for the perpetrator's actions. In many countries specific laws make it a crime to use another person's identity for
personal gain.
Identity theft is somewhat different from identity fraud, which is related to the usage of a 'false identity' to commit fraud. Identity theft means impersonating a real
person.
Mobile Security
Accessing Internet through Mobile PC or Mobiles for official purposes, remote access to all business applications may put personal or organizational information at
risk
Small amounts of wireless signal can travel significant distance and its possible to peep in to these signals using a wireless sniffer. A wireless intruder
could expose critical information.
Search Within Portal
https://vikaspedia.in/education/digital-litercy/information-security/computer-threats-and-attacks 2/4
4/26/22, 12:41 PM Computer Threats and Attacks — Vikaspedia
If device is lost or stolen, the entire corporate intranet could be threatened if those devices are not protected by password and other user level security
measures
Mobile Viruses can be major threat, particularly with devices that have significant computational capabilities and connectivity options like WLAN, Bluetooth
etc
Voice Phishing (Vishing) is one type of attack as you may receive an e-mail or get a pre recorded voice message (From either from bank or some financial
institution) informing you that a large transaction which you never performed and basically held up. The message includes a toll-free-number that you call right away
to deal with the situation.
When you dial back to the toll-free-number, a voice menu prompts you to enter your card details and pin number etc and the Vishers may ask you to enter other
data also such as expiration date, CVV number. If you act without thinking clearly, you might provide all of the information they ask for
Social Networking
What is Social Networking:
A social network is a social structure made of nodes (which are generally individuals or organizations) that are tied by one or more specific types of
interdependency, such as values, visions, ideas, financial exchange, friendship, kinship, dislike, conflict or trade
Social networks are fun to use, helpful for job hunting, and great for keeping in touch with friends, business contacts, and relatives.
Issues :
The other side of Social Networks is security and privacy issues are entirely treated as two different issues as security issue is a hacker gains unauthorized access
to sites protected resources and the privacy issues is someone can gain access to confidential information by simply watching you type your password. But both
types of breaches are often intertwined on social networks, especially since anyone who breaches a site's security network opens the door to easy access to
private information belonging to any user.
The reason social network security and privacy lapses exist results simply from the astronomical amounts of information the sites process each and every day that
end up making it that much easier to exploit a single flaw in the system. Features that invite user participation -- messages, invitations, photos, open platform
applications, etc. -- are often the avenues used to gain access to private information
Some of the Social networking sites third party application program interface (API) which allows for easy theft of private information and it gave developers access
to far more information addresses, pictures than needed to test the applications
Cyber Harassment
Cyberstalking and cyberharassment are very similar. Most people use them interchangeably, but there is a subtle distinction, typically relating to the perpetrator’s
intent and the original motivation for their behavior.
While the two situations usually involve many of the same online tactics, cyberstalking is almost always characterized by the stalker relentlessly pursuing his\her
victim online and is much more likely to include some form of offline attack, as well. This offline aspect makes it a more serious situation as it can easily lead to
dangerous physical contact, if the victim’s location is known
https://vikaspedia.in/education/digital-litercy/information-security/computer-threats-and-attacks 3/4
4/26/22, 12:41 PM Computer Threats and Attacks — Vikaspedia
Source: ISEA
© 2006–2019 C–DAC.All content appearing on the vikaspedia portal is through collaborative effort of vikaspedia and its partners.We encourage
you to use and share the content in a respectful and fair manner. Please leave all source links intact and adhere to applicable copyright and
intellectual property guidelines and laws.
https://vikaspedia.in/education/digital-litercy/information-security/computer-threats-and-attacks 4/4